Application Intrusion, Detection and Tracking

When there was just a browser the attack vectors on a system were simple. But, with mobile, AIR, and now set top development, the number of vectors is growing. This in itself is not the issue. The problem is that for most applications security is an after thought. If any security is added it is usually to protect form submission. In this session we will look at the anatomy of an attack. We will look at some basic examples of how secure code is not. We discuss good and bad practices on what will and will not work when protecting your application. We will look at ways to know you are being attacked. We will also dispel some common misconceptions of what is secure.